The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-2450-1 | samba security update |
![]() |
USN-1423-1 | Samba vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T18:53:36.132Z
Reserved: 2012-02-14T00:00:00
Link: CVE-2012-1182

No data.

Status : Deferred
Published: 2012-04-10T21:55:02.203
Modified: 2025-04-11T00:51:21.963
Link: CVE-2012-1182


No data.